Sovereign solutions for DNS, CDN, WAF, and DDoS mitigation.
Caching edge servers located around the globe bring content closer to your visitors, reducing latency & improving website performance.
Learn MoreOur advanced in-house DNS supports geotargeting, health checks, and configurable failover records, for maximum flexibility and resilience.
Learn MoreManage domains, DNS, load balancing, HTTPS certificates, black/whitelists, bot filtering & more in a single location.
Sign UpFully transparent, you can view and audit our code. Our products do what they say on the tin with no hidden backdoors.
Code RepositoryWe believe open sourcing parts of our software improves transparency and security. Anybody in the world can look through our source code and see there are no hidden tricks, spying, or telemetry.
Furthermore, there is a vast community of people who contribute to open source software by adding features and fixing bugs which would not be possible with locked-down proprietery software.
We allow freedom of expression. Unless compelled legally, such as by a court order, we will never discriminate customers based on website content, nor give in to any protest or social pressures.
We've built from the ground up to be vendor agnostic and agile. That means we don't depend on any "cloud" provider, and no single company can decide to take you offline, period.
If you are a high-risk and/or high-profile website facing censorship, get in touch today to discuss solutions.
"Private" or "secret" keys are a piece of information used in securing encrypted channels of communication. Ideally, these should be kept only in the custody of whomever you want to be able to decrypt any communications secured by that key.
However, in many CDN and hosting environments, key management is not under the control of each business but by the hosting provider themselves.
If you are interested in a private deployment where you have full custody of all keys, get in touch today to discuss solutions.
DDoS or DoS, stands for (distributed) denial of service. This refers to a class of cyber attack which typically involves sending large amounts of fraudulent traffic to overwhelm your website or server, making it impossible to access or extremely slow for legitimate users and effectively denying service. Learn more on wikipedia.
Motivations for DDoS attacks vary but are commonly perpetrated by criminal organisations trying to extort you, or shady competitors seeking to get an unfair advantage.
Don't become a victim. BasedFlare specialises in protecting you against these kind of attacks. Our network will filter and absorb malicious traffic, passing only legitimate traffic to your backend servers and ensuring service continuity.
• Domain management
• Server cluster management
• DNS with geo-targeting and health checks
• Backend server management and load balancing
• HTTPS certificate generation and automatic renewal
• Private CA certificate signing
• DDoS protection settings and rule management
• Redirects and rewrite rules
• IP/subnet whitelist and blacklist
• ASN blacklist
• Maintenance mode toggle
Yes, visit basedstatus.online to see the uptime and current status of all our services.
Have a question that isn't answered here or want to know more? Contact us.